DEADBOLT Explorer Streamlines Identity/Access Auditing

Share Article

JME Software (JME), a leading innovator of tools and applications that simplify the management of IT infrastructure across the enterprise, today announced the availability of the next release of DEADBOLT Explorer - an identity auditing and reporting tool for distributed enterprise environments that automatically discovers user ids and associated access rights to systems, applications and data. DEADBOLT Explorer provides the information needed to perform a successful security audit and to meet the evidence requirements of compliance officers.

JME Software (JME), a leading innovator of tools and applications that simplify the management of IT infrastructure across the enterprise, today announced the availability of the next release of DEADBOLT Explorer - an identity auditing and reporting tool for distributed enterprise environments that automatically discovers user ids and associated access rights to systems, applications and data. DEADBOLT Explorer provides the information needed to perform a successful security audit and to meet the evidence requirements of compliance officers.

DEADBOLT Explorer provides security information about users and groups of users, in concert with the resources they can access that span all Microsoft Windows, UNIX, and IBM z/OS platforms in the enterprise. DEADBOLT Explorer discovers the security attributes for resources and the permissions individuals, user IDs, and groups have to access resources. DEADBOLT Explorer then matches real people, by name, to the user IDs assigned to them, as well as to their group memberships.

DEADBOLT Explorer helps organizations answer a few key questions.

1.    Who is the owner of a specific user ID?
2.    What resources does the user ID have access to (system, data, application)?
3.    What type of access do they have (read, write, delete)?
4.    What facility granted them access?

"Just managing the number of unique user IDs and related passwords being juggled by today's typical user represents a challenge - but, if you are in IT facing a security audit, the task of determining who has access rights to what resources across the enterprise can be overwhelming," said Richard Ptak, Ptak, Noel & Associates. "Tools that automate the discovery of user ID's and access permissions can not only speed up the process, but also easily provide critical information for compliance officers and security administrators, such as when and to what extent to de-provision users who may be changing roles, leaving a department or exiting the company."

DEADBOLT Explorer automatically discovers and matches a user ID to an individual, sets a confidence level to the assignment, and enables management to review and provide attestations for these assignments. Access permissions are typically reviewed, approved or denied by the resource owner (system or database administrator), the business owner (line of business executive) or the HR department.

DEADBOLT Explorer scans network directories (Active Directory, LDAP), operating system, database and application identity and access management systems to discover unique user IDs and utilizes fuzzy logic to associate the user ID with a specific individual. Scans can be run ad-hoc, when needed, or can be scheduled to run at a specific date/time.

DEADBOLT Explorer provides a rich set of pre-defined reports and offers a wizard-based reporting feature to create custom reports that can be viewed on-line, printed or exported to a spreadsheet. Reports can be run ad-hoc or created and distributed on a specific schedule.

For more information about DEADBOLT Explorer, visit http://www.jmesoftware.com.

Pricing and Availability

DEADBOLT Explorer is available today. Licensing and pricing options can be obtained by contacting the company at (866) 403-2838 or sales@jmesoftware.com.

About JME Software

JME Software is delivering a new generation of tools and applications for managing, monitoring, securing and automating the 21st century IT infrastructure. JME Software solutions simplify the management of systems, networks and applications across the entire enterprise - from mainframes and servers in the datacenter to Windows and Linux on the desktop. All JME products are built on a Service-Oriented Architecture (SOA), offer a common browser-based look and feel, and leverage relational databases for real-time reporting. JME Software is a private company, headquartered in Sugar Land, Texas.

###

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Rick Berzle

Tom Repede
Visit website